Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1486400 - (CVE-2017-13711) CVE-2017-13711 QEMU: Slirp: use-after-free when sending response
CVE-2017-13711 QEMU: Slirp: use-after-free when sending response
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20170803,reported=2...
: Security
Depends On: 1508744 1509208 1486401 1508739 1508742 1508743 1508745 1508746 1508747 1508748 1508749 1508750 1508751 1508752 1508753 1520690
Blocks: 1462816 1520691
  Show dependency treegraph
 
Reported: 2017-08-29 12:07 EDT by Prasad J Pandit
Modified: 2018-09-07 00:54 EDT (History)
42 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A use-after-free issue was found in the Slirp networking implementation of the Quick emulator (QEMU). It occurs when a Socket referenced from multiple packets is freed while responding to a message. A user/process could use this flaw to crash the QEMU process on the host resulting in denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:0816 None None None 2018-04-10 04:22 EDT
Red Hat Product Errata RHSA-2018:1104 None None None 2018-04-10 14:55 EDT
Red Hat Product Errata RHSA-2018:1113 None None None 2018-04-11 14:02 EDT

  None (edit)
Description Prasad J Pandit 2017-08-29 12:07:25 EDT
Quick emulator(Qemu) built with the Slirp networking support is vulnerable
to an use-after-free issue. It occurs due to Socket referenced from multiple
packets is freed while responding to a message.

A user/process could use this flaw to crash the Qemu process on the host
resulting in DoS.

Upstream patch:
---------------
  -> https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg05201.html

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/08/29/6
Comment 1 Prasad J Pandit 2017-08-29 12:08:05 EDT
Acknowledgments:

Name: Wjjzhang (Tencent.com)
Comment 2 Prasad J Pandit 2017-08-29 12:09:12 EDT
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1486401]
Comment 3 Joshua Padman 2017-10-16 00:22:19 EDT
Changed openstack to affected / fix. We will be getting this from y-stream
Comment 4 Prasad J Pandit 2017-11-02 02:37:43 EDT
Created qemu tracking bugs for this issue:

Affects: fedora-all [bug 1508739]
Comment 17 errata-xmlrpc 2018-04-10 04:22:31 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0816 https://access.redhat.com/errata/RHSA-2018:0816
Comment 18 errata-xmlrpc 2018-04-10 14:55:14 EDT
This issue has been addressed in the following products:

  Red Hat Virtualization 4 for RHEL-7

Via RHSA-2018:1104 https://access.redhat.com/errata/RHSA-2018:1104
Comment 19 errata-xmlrpc 2018-04-11 14:02:18 EDT
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)
  Red Hat OpenStack Platform 11.0 (Ocata)
  Red Hat OpenStack Platform 8.0 (Liberty)
  Red Hat OpenStack Platform 9.0 (Mitaka)
  Red Hat OpenStack Platform 12.0 (Pike)

Via RHSA-2018:1113 https://access.redhat.com/errata/RHSA-2018:1113

Note You need to log in before you can comment on or make changes to this bug.